Zacytuj

[1] PAPADAKI, M. – FURNELL, S.: “IDS or IPS: What Is Best?” Network Security, grade. 2004: doi.org, 7 7, No. 2004 (15–19) https://doi.org/10.1016/S1353-4858(04)00106-0 Search in Google Scholar

[2] GHAFAR A. JAAFAR et al. “Review of Recent Detection Methods for HTTP DDoS Attack”. Journal of Computer Networks and Communications, grade. 2019: doi.org, 18 1, No. 2019 (1–10) https://doi.org/10.1155/2019/1283472 Search in Google Scholar

[3] GALINEC, D. et al. “Cybersecurity and Cyber De-fence: National Level Strategic Approach”. Automatika, grade. 58,č. 3 (Crossref).: doi.org, 18 7, No. 2017 (273–286) https://doi.org/10.1080/00051144.2017.1407022 Search in Google Scholar

[4] VON SOLMS, R. – VAN NIEKERK, J.: “From Information Security to Cyber Security”. Computers Security, grade. 38:, 18 10, No. 2013 (97–102) https://doi.org/10.1016/j.cose.2013.04.004 Search in Google Scholar

[5] KILINCER, I.F. et al. “Machine Learning Methods for Cyber Security Intrusion Detection: Datasets and Comparative Study”. Computer Networks, grade. 188:, 18 4, No. 2021 (107840) https://doi.org/10.1016/j.comnet.2021.107840 Search in Google Scholar

[6] AOUINI, Z.– PEKAR, A.: “NFStream”. Computer Networks, grade. 204:, 18 2, No. 2022 (108719) https://doi.org/10.1016/j.comnet.2021.108719 Search in Google Scholar

[7] PEKÁR, A. et al. “Adaptive Aggregation of Flow Records”. Computing and Informatics, grade. 37:, 1 1, No. 2018 (142–164) https://doi.org/10.4149/cai_2018_1_142 Search in Google Scholar

[8] GUAN, H. et al. “Performance Enhancement for Network I/O Virtualization with Efficient Interrupt Coalescing and Virtual Receive-Side Scaling”. IEEE Transactions on Parallel and Distributed Systems, grade. 24:, 6 6, No. 2013 (1118–11128) https://doi.org/10.1109/TPDS.2012.339 Search in Google Scholar

[9] GYORöDI, C. et al. “A Comparative Study of Relational and Non-Relational Database Models in a Web- Based Application”. International Journal of Advanced Computer Science and Applications, grade. 6:, 18 11, No. 2015 (78–83) https://doi.org/10.14569/IJACSA.2015.061111 Search in Google Scholar

[10] VAJDA, D. et al. “Towards Machine Learning-based Anomaly Detection on Time-Series Data”. Infocommunications journal, grade. 13:, 18 1, No. 2021 (35–44) https://doi.org/10.36244/ICJ.2021.1.5 Search in Google Scholar

eISSN:
1338-3957
Język:
Angielski
Częstotliwość wydawania:
4 razy w roku
Dziedziny czasopisma:
Computer Sciences, Information Technology, Databases and Data Mining, Engineering, Electrical Engineering